All insights

Blogs

No results found

Corporate communications

The people of Wuhan, China suffered a second and unexpected indignity after enduring the outbreak of COVID-19. Several residents of the original epicenter of the virus found their names, addresses, daily movements and other personal data leaked online. It was an apparent attempt by vigilantes to protect the rest of the population from those presumed to carry the virus.

Cyber Security

Cyber criminals are social chameleons – constantly adapting and searching for opportunities to use their technical expertise to exploit primal emotions.

Cyber Security

With an increase of 67% in cyber security breaches in the past 5 years, the record GDPR fine of €204m for the British Airways Data breach and a growing diversity of sophisticated attacks, it’s not surprising that cyber incidents are listed as the top business risk for 2020 according to the latest Allianz Risk Barometer. In today’s digitally interconnected working world, cyber-attacks rarely affect isolated elements of a company but have an impact on multiple sites, departments and global business operations.

Cyber Security

While recent meetings in Europe between Prime Minister Johnson and his counterparts in Brussels, Germany and France may have brought increased hope that a revised deal can be negotiated for Britain’s departure from the EU, it is still the case that a ‘No Deal’ exit remains a distinct possibility. This would see the UK leave the EU at the expiry of the Article 50 extension, at 11 p.m. on 31 October.

Cyber Security

The current political and business landscape is extremely volatile. The result? Companies are increasingly likely to face issues that can damage their reputations, destroy consumer trust, harm employee morale, and impact share price.

Cyber Security

In the last month we’ve seen airlines, online retailers and local government suffer breaches in one form or another. So while there’s clearly a pressing need for companies to improve internal resilience and security, coping with the aftermath of a breach is almost as crucial. As many technical experts will tell you – for most it is a matter of when there is a breach rather than when.